ASF Bugzilla – Attachment 38069 Details for
Bug 65631
Proxy CONNECT error 500
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
filtered tcpdump output of one request returning 500
dump.22590 (text/plain), 2.84 KB, created by
Pavel Mateja
on 2021-10-14 14:44:59 UTC
(
hide
)
Description:
filtered tcpdump output of one request returning 500
Filename:
MIME Type:
Creator:
Pavel Mateja
Created:
2021-10-14 14:44:59 UTC
Size:
2.84 KB
patch
obsolete
>14:04:21.689300 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [S], seq 686609064, win 64240, options [mss 1460,sackOK,TS val 477934480 ecr 0,nop,wscale 7], length 0 >14:04:21.689329 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [S.], seq 3034348581, ack 686609065, win 64240, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0 >14:04:21.690544 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [.], ack 1, win 502, length 0 >14:04:21.703180 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [P.], seq 1:133, ack 1, win 502, length 132: HTTP: CONNECT server_somewhere.com:443 HTTP/1.1 >14:04:21.703210 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [.], ack 133, win 501, length 0 >14:04:21.764627 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [P.], seq 1:61, ack 133, win 501, length 60: HTTP: HTTP/1.0 200 Connection Established >14:04:21.765436 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [.], ack 61, win 502, length 0 >14:04:21.766226 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [P.], seq 133:650, ack 61, win 502, length 517: HTTP >14:04:21.766234 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [.], ack 650, win 501, length 0 >14:04:21.767101 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [P.], seq 61:2981, ack 650, win 501, length 2920: HTTP >14:04:21.767106 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [P.], seq 2981:3853, ack 650, win 501, length 872: HTTP >14:04:21.768005 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [.], ack 2981, win 497, length 0 >14:04:21.768005 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [.], ack 3853, win 491, length 0 >14:04:21.768537 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [P.], seq 650:730, ack 3853, win 501, length 80: HTTP >14:04:21.768578 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [.], ack 730, win 501, length 0 >14:04:21.768983 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [P.], seq 3853:4459, ack 730, win 501, length 606: HTTP >14:04:21.769371 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [P.], seq 730:1479, ack 3853, win 501, length 749: HTTP >14:04:21.769378 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [.], ack 1479, win 501, length 0 >14:04:21.769846 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [.], ack 4459, win 501, length 0 >14:04:22.397055 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [P.], seq 4459:5102, ack 1479, win 501, length 643: HTTP >14:04:22.397106 bond0 Out IP AB.XYZ.49.8.8080 > AB.XYZ.48.134.22590: Flags [F.], seq 5102, ack 1479, win 501, length 0 >14:04:22.397732 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [.], ack 5102, win 501, length 0 >14:04:22.398664 bond0 In IP AB.XYZ.48.134.22590 > AB.XYZ.49.8.8080: Flags [R.], seq 1479, ack 5103, win 501, length 0
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 65631
:
38066
| 38069 |
38070